dbrgn / descrackLinks
HSR OpenCL research project based on existing code.
☆13Updated 9 years ago
Alternatives and similar repositories for descrack
Users that are interested in descrack are comparing it to the libraries listed below
Sorting:
- PGPCrack-NG is a program designed to brute-force symmetrically encrypted PGP files. It is a replacment for the long dead PGPCrack.☆24Updated 8 years ago
- Mifare Classic Offline Cracker☆23Updated 5 years ago
- PHP framework to test User-Agents and intermediary content inspection devices for denial-of-service vulnerabilities with respect to HTTP …☆27Updated 12 years ago
- Generic Identity Device Specification Applet☆109Updated last year
- Bootloader for bcm3384☆54Updated 8 years ago
- ☆204Updated 2 years ago
- Android App that genereates passcode authentication codes for Postfinance cards☆11Updated 3 years ago
- USB armory - boot loader☆37Updated 2 weeks ago
- Project Gutenberg Australia word lists☆14Updated 3 years ago
- Shikra (http://int3.cc/products/the-shikra) programming utility☆44Updated 4 years ago
- Mainframe bruter and screen automation utility.☆43Updated 11 years ago
- My presentations and papers☆47Updated 4 years ago
- Capture data from QPSK-demodulated OOB bitstream with Saleae logic analyzer and output byte stream.☆21Updated 9 years ago
- decode bits into bytes☆45Updated 5 years ago
- USB armory Debian base image☆83Updated 2 weeks ago
- LTE monitor mode for Samsung C2xx-based USB dongles. Includes wireshark dissector and Linux kernel driver.☆44Updated 11 years ago
- An implementation of the concepts behind the Logjam attack☆16Updated 9 years ago
- The world's first Linux white-box ransomware☆64Updated 7 years ago
- Tools for playing with Entrust IdentityGuard soft tokens, such as decrypting QR codes and deriving OTP secrets☆48Updated 2 years ago
- ☆145Updated 5 years ago
- Vulnerability scanner for OFX servers☆32Updated last year
- a low pin count sniffer for icestick☆97Updated 6 years ago
- Distributed wrapper around oclHashcat☆91Updated 8 months ago
- Files compiled from the Logica breach investigation materials☆44Updated 7 years ago
- MS-CHAP-V2 SHOULD NOT be used...☆19Updated 3 years ago
- Tools to work with the pwnedkeys.com API☆10Updated 6 years ago
- TPM-Fail Attack code & data☆122Updated 2 years ago
- Reading, writing and analysis of magnetic stripe information☆28Updated 15 years ago
- Process QPSK-demodulated data into transport stream (SCTE 55-1)☆21Updated 9 years ago
- Guaranteed cracking of PDF files using RC4 40-bit encryption☆20Updated 12 years ago